Remove resources webinars
article thumbnail

Chasing Ghosts: Automating Malware Triage to Reduce EDR False Positives

Data Breach Today

The Ups and Downs of EDR and XDR Deployments In this webinar recording, learn how VMRay reduces false positives in EDR and XDR, saving resources and addressing analyst burnout while calculating the annual cost of false positives for your organization.

288
288
article thumbnail

Webinar | 4 Actions to Secure Work from Home Employees

Data Breach Today

IT resources are being stretched to mobilize an urgent shift to remote access and remote work. This informational webinar will outline 4 actions you can take today to keep employees secure and productive during these challenging times, with tips straight from your identity and access management peers.

Security 230
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digitization Regulations–The First Year

National Archives Records Express

Digitization Resources In the past year since the regulations were issued, NARA created many additional resources to help agencies implement the new digitization requirements. As new resources are developed, we will add them to the webpage and announce them here on Records Express.

article thumbnail

Disposition 101 Webinar Now Available

The Texas Record

We are very excited to announce the newly revamped Disposition 101 webinar, which is now available on our website along with several other free records management webinars and supplemental resources. Check out the Disposition 101 webinar page for the video recording, handouts and a certificate of completion.

article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

The end result is the ability to streamline your allocation of capital and resources. In this webinar, you will learn how to: Outline popular change management models and processes. Organize ERM strategy, operations, and data. Determine impact tangents. Practice change management process with ERM data.

article thumbnail

Live Webinar | Automate Threat Hunting with Security Analytics & Machine Learning

Data Breach Today

Meanwhile, individual tools including DLP, EDR, CASBs, email security and advanced threat protection are only designed to identify individual elements of a campaign, putting the onus on human analysts to piece together the bigger picture - when time and resources allow. Addressing DLP, EDR and Email Security use cases;

Analytics 224
article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Throughout 2022, Thales hosted more than 40 webinars on a wide variety of cybersecurity topics, including, cloud security, data sovereignty, compliance, data threat trends, and rethinking approaches to role-based authentication.

article thumbnail

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

In this webinar, you will learn: How to shift left with the security team supporting developers? How a belief that DevOps resources are jack of all trades can increase your risks, not lessen. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.